Update

Visual Studio 2019

Visual Studio 2019

to version 16.11.46

View all applications
Patching for Windows Mac Linux

CVE Vulnerabilities for Visual Studio 2019

CVEPublishedSeverityDetailsExploitabilityImpact Vector
CVE‑2022‑247672022‑04‑12 18:15:10HIGH (8)GitHub: Git for Windows' uninstaller vulnerable to DLL hijacking when run under the SYSTEM user account.26LOCAL
CVE‑2022‑218712022‑01‑11 21:15:11HIGH (8)Microsoft Diagnostics Hub Standard Collector Runtime Elevation of Privilege Vulnerability26LOCAL
CVE‑2020‑11472020‑07‑14 23:15:12HIGH (8)A remote code execution vulnerability exists in .NET Framework, Microsoft SharePoint, and Visual Studio when the software fails to check the source markup of XML file input, aka '.NET Framework, SharePoint Server, and Visual Studio Remote Code Execution Vulnerability'.26LOCAL
CVE‑2020‑08992020‑04‑15 15:15:14MEDIUM (6)An elevation of privilege vulnerability exists when Microsoft Visual Studio updater service improperly handles file permissions, aka 'Microsoft Visual Studio Elevation of Privilege Vulnerability'.24LOCAL
CVE‑2020‑08842020‑03‑12 16:15:20LOW (4)A spoofing vulnerability exists in Microsoft Visual Studio as it includes a reply URL that is not secured by SSL, aka 'Microsoft Visual Studio Spoofing Vulnerability'.21NETWORK
CVE‑2019‑13542020‑01‑24 21:15:13HIGH (9)A remote code execution vulnerability exists when Git for Visual Studio improperly sanitizes input, aka 'Git for Visual Studio Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1349, CVE-2019-1350, CVE-2019-1352, CVE-2019-1387.36NETWORK
CVE‑2019‑13522020‑01‑24 21:15:13HIGH (9)A remote code execution vulnerability exists when Git for Visual Studio improperly sanitizes input, aka 'Git for Visual Studio Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1349, CVE-2019-1350, CVE-2019-1354, CVE-2019-1387.36NETWORK
CVE‑2019‑13512020‑01‑24 21:15:13HIGH (8)A tampering vulnerability exists when Git for Visual Studio improperly handles virtual drive paths, aka 'Git for Visual Studio Tampering Vulnerability'.44NETWORK
CVE‑2019‑13502020‑01‑24 21:15:13HIGH (9)A remote code execution vulnerability exists when Git for Visual Studio improperly sanitizes input, aka 'Git for Visual Studio Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1349, CVE-2019-1352, CVE-2019-1354, CVE-2019-1387.36NETWORK
CVE‑2019‑13492020‑01‑24 21:15:13HIGH (9)A remote code execution vulnerability exists when Git for Visual Studio improperly sanitizes input, aka 'Git for Visual Studio Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1350, CVE-2019-1352, CVE-2019-1354, CVE-2019-1387.36NETWORK
CVE‑2019‑12112019‑08‑14 21:15:18LOW (4)An elevation of privilege vulnerability exists in Git for Visual Studio when it improperly parses configuration files. An attacker who successfully exploited the vulnerability could execute code in the context of another local user. To exploit the vulnerability, an authenticated attacker would need to modify Git configuration files on a system prior to a full installation of the application. The attacker would then need to convince another user on the system to execute specific Git commands. The update addresses the issue by changing the permissions required to edit configuration files. 00LOCAL
Windows Mac Linux

What applications does Lavawall® monitor?

Lavawall monitors patches for over 7,500 applications. This is a summary of the most popular applications.
Click here for the full list.
Click the applications below for the current version and known vulnerabilities.
Logos are property of their respective trademark holders and are not affiliated with ThreeShield or Lavawall. We have not audited the security of most of the listed tools.
Logos, products, trade names, and company names are all the property of their respective trademark holders.
The above listing includes products that Lavawall® monitors through public information and/or proprietary statistical analysis.
Although we do have a partner relationship with some of the listed products and companies, they do not necessarily endorse Lavawall® or have integrations with our systems.